AppAssure User Guide, Release 5.4.3, Revision B - Dell

Transcription

Dell AppAssure User Guide5.4.3 Revision B

2015 Dell Inc. ALL RIGHTS RESERVED.This guide contains proprietary information protected by copyright. The software described in this guide is furnished under asoftware license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of theapplicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic ormechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the writtenpermission of Dell Inc.The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel orotherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPTAS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NOLIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTSINCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, ORNON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL ORINCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSSOF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THEPOSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness ofthe contents of this document and reserves the right to make changes to specifications and product descriptions at any timewithout notice. Dell does not make any commitment to update the information contained in this document.If you have any questions regarding your potential use of this material, contact:Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656Refer to our web site (software.dell.com) for regional and international office information.Dell AppAssure software makes use of the Emit Mapper dynamic link library v. 1.0.0 (DLL) licensed under the GNU LibraryGeneral Public License (LGPL) version 2.1, February 1999. Emit Mapper’s copyright notice is: “Copyright 1991, 1999 FreeSoftware Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. Everyone is permitted to copy anddistribute verbatim copies of this license document, but changing it is not allowed.”Users may view the full text of the LGPL license where it is posted as a third party license agreement ments.aspx. The Emit Mapper source code can be found athttp://opensource.dell.com/.TrademarksDell, the Dell logo, and AppAssure are trademarks of Dell Inc. and/or its affiliates. Other trademarks and trade names may beused in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims anyproprietary interest in the marks and names of others.LegendCAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.Dell AppAssure User Guide Updated - April 2015 Software Version - 5.4.3 Revision B

ContentsIntroduction to AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13AppAssure core technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Live Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Verified Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Universal Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14True Global Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Product features of AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15True Global Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17Recovery-as-a-Service (RaaS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18Retention and archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18Virtualization and cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Alerts and event management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19License Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Web console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Service management APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20White labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20AppAssure wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20Understanding the AppAssure Core Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Navigating the Core Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Viewing the Home tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Viewing the Replication tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27Viewing the Virtual Standby tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30Viewing the Events tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31Viewing the Tools tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32Viewing the Configuration tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Using the Error dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35Understanding the Quick Start Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36Launching the Quick Start Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37Hiding the Quick Start Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38Viewing the protected machines menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38Viewing the Machines tab for a protected machine . . . . . . . . . . . . . . . . . . . . . . .39Viewing the Summary tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43Viewing the Recovery Points tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44Viewing the Events tab for a protected machine . . . . . . . . . . . . . . . . . . . . . . . . .45Viewing the Tools tab for a protected machine . . . . . . . . . . . . . . . . . . . . . . . . . .47Viewing the configuration tab for a protected machine . . . . . . . . . . . . . . . . . . . .48Viewing the replicated machines menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48Viewing the Recovery Points Only menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49Viewing the Custom Groups menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49Dell AppAssure User GuideVersion 5.4.3 Revision B1

Configuring the AppAssure Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Understanding repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51Managing a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52Creating a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52Viewing details about a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55Modifying repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56Opening an existing repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57Adding a storage location to an existing repository . . . . . . . . . . . . . . . . . . . . . . .57Checking a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59Deleting a repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59About the repository Integrity Check job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59Running the Integrity Check job on a repository . . . . . . . . . . . . . . . . . . . . . . . . .60Understanding custom groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61Creating custom groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62Modifying custom group names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62Removing custom groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63Performing group actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63Viewing all machines in a custom group on one page . . . . . . . . . . . . . . . . . . . . . .64Backing up and restoring the Core configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .64Backing up the Core configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64Restoring a backed-up Core configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65Managing AppAssure Core settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66Understanding system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71Viewing system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71Configuring the Core general settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72Configuring update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72Understanding nightly jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73Configuring nightly jobs for the Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74Modifying transfer queue settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75Adjusting client timeout settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75Understanding deduplication cache size and storage locations . . . . . . . . . . . . . . . . . .76Configuring deduplication cache settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77Configuring Replay engine settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78Configuring deployment settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79Configuring database connection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80Managing licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81Changing a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81Contacting the Dell AppAssure License Portal server . . . . . . . . . . . . . . . . . . . . . .82Backing up and restoring Core settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83Configuring Core job settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84Editing Core job settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85Adding Core jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85Accessing diagnostics for the Core . . .Downloading the Core logs . . . . .Viewing the Core logs . . . . . . . . .Uploading logs . . . . . . . . . . . . . . . . . . . . .86. . . . . . . . .86. . . . . . . . .86. . . . . . . . .86Dell AppAssure User GuideVersion 5.4.3 Revision B2

Understanding encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88Applying or removing encryption from a protected machine . . . . . . . . . . . . . . . . . . . .89Associating an encryption key with a protected machine . . . . . . . . . . . . . . . . . . . .89Applying an encryption key from the Machines tab . . . . . . . . . . . . . . . . . . . . . . . .90Disassociating an encryption key from a protected machine . . . . . . . . . . . . . . . . .91Managing encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92Adding an encryption key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93Importing an encryption key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94Locking or unlocking an encryption key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94Editing an encryption key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96Changing an encryption key passphrase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Refer to our web site (software.dell.com) for regional and international office information. Dell AppAssure software makes use of the Emit Mapper dynamic link library v. 1.0.0 (DLL) licensed under the GNU Library General Public License (LGPL) version 2.1, February 1999. Emit Mapper’s copyright notice is: “Copyright 1991, 1999 Free